| Summary | In the Linux kernel, the following vulnerability has been resolved: x86/kexec: Disable KCOV instrumentation after load_segments() The load_segments() function changes segment registers, invalidating GS base To reproduce the problem, it's sufficient to do kexec on a KCOV-instrumented $ kexec -l /boot/otherKernel The real-world context for this problem is enabling crash dump collection in Adding safeguards directly to the KCOV fast-path (__sanitizer_cov_trace_pc()) Disabling instrumentation for the individual functions would be too fragile, The problem is not relevant for 32 bit kernels as CONFIG_KCOV is not supported [ bp: Space out comment for better readability. ] |
|---|---|
| Publication Date | May 8, 2026, 11:16 p.m. |
| Registration Date | May 9, 2026, 4:13 a.m. |
| Last Update | May 8, 2026, 11:16 p.m. |